Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Detecting and Preventing Password Spraying Attacks
Passwords are common ways of logging into the system, service, or application. They are typically used in combination with usernames to confirm user identity and gain access to target systems. Even though many of us know passwords should be strong and frequently...
Understanding the Adversary-in-the-Middle Attack – How It Works and How to Defend Against It
What Is an Adversary-in-the-Middle Attack? An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of cyber attack in which an attacker intercepts and relays messages between two parties who believe...
Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection
History of MITRE ATTACK Framework The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) organizations used against business Windows networks was first addressed by MITRE in 2013. FMX (Fort Meade...
Unraveling RTO vs. RPO: Key Factors in Disaster Preparedness
With sufficient funding and infrastructure, any system could theoretically achieve near-constant uptime through any situation. Reality dictates a more conservative outlook. To establish a workable budget and a practical plan, you will need to determine your...
ALMOST 60% OF BUSINESSES ARE ‘VERY’ TO ‘EXTREMELY’ CONCERNED ABOUT RANSOMWARE ATTACKS – HORNETSECURITY ANNUAL RANSOMWARE SURVEY
More than half of leadership teams are ‘actively involved’ in decision-making on preventing attacks One in five respondents said their company suffered an attack in 2023 Nuremberg, Germany (10 October 2023) – Nearly 60% of companies are ‘very’ to ‘extremely’ concerned...
Malware vs. Viruses: Understanding the Threat Landscape
There is a misconception about what malware and viruses are. Many people use it interchangeably, however, they are two different things. Malware is any malicious software that has a goal to harm someone's data or systems. The virus is just a type of malware. In this...
Monthly Threat Report October 2023
Introduction The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from the month...
How to Air-Gap and Isolate Your Backups
In this article, following on from How to Secure and Protect Backup Data, we look at how to isolate your backups using air-gapping, firewall, performing risk analysis for your backup strategy, encrypting backups for additional protection and round off with some...